yara/rules/Windows_Trojan_RedLineStealer.yar (200 lines of code) (raw):
rule Windows_Trojan_RedLineStealer_17ee6a17 {
meta:
author = "Elastic Security"
id = "17ee6a17-161e-454a-baf1-2734995c82cd"
fingerprint = "a1f75937e83f72f61e027a1045374d3bd17cd387b223a6909b9aed52d2bc2580"
creation_date = "2021-06-12"
last_modified = "2021-08-23"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "497bc53c1c75003fe4ae3199b0ff656c085f21dffa71d00d7a3a33abce1a3382"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "RedLine.Logic.SQLite" ascii fullword
$a2 = "RedLine.Reburn.Data.Browsers.Gecko" ascii fullword
$a3 = "RedLine.Client.Models.Gecko" ascii fullword
$b1 = "SELECT * FROM Win32_Process Where SessionId='{0}'" wide fullword
$b2 = "get_encryptedUsername" ascii fullword
$b3 = "https://icanhazip.com" wide fullword
$b4 = "GetPrivate3Key" ascii fullword
$b5 = "get_GrabTelegram" ascii fullword
$b6 = "<GrabUserAgent>k__BackingField" ascii fullword
condition:
1 of ($a*) or all of ($b*)
}
rule Windows_Trojan_RedLineStealer_f54632eb {
meta:
author = "Elastic Security"
id = "f54632eb-2c66-4aff-802d-ad1c076e5a5e"
fingerprint = "6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0"
creation_date = "2021-06-12"
last_modified = "2021-08-23"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "ttp://checkip.amazonaws.com/logins.json" wide fullword
$a2 = "https://ipinfo.io/ip%appdata%\\" wide fullword
$a3 = "Software\\Valve\\SteamLogin Data" wide fullword
$a4 = "get_ScannedWallets" ascii fullword
$a5 = "get_ScanTelegram" ascii fullword
$a6 = "get_ScanGeckoBrowsersPaths" ascii fullword
$a7 = "<Processes>k__BackingField" ascii fullword
$a8 = "<GetWindowsVersion>g__HKLM_GetString|11_0" ascii fullword
$a9 = "<ScanFTP>k__BackingField" ascii fullword
$a10 = "DataManager.Data.Credentials" ascii fullword
condition:
6 of ($a*)
}
rule Windows_Trojan_RedLineStealer_3d9371fd {
meta:
author = "Elastic Security"
id = "3d9371fd-c094-40fc-baf8-f0e9e9a54ff9"
fingerprint = "2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23"
creation_date = "2022-02-17"
last_modified = "2022-04-12"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "get_encrypted_key" ascii fullword
$a2 = "get_PassedPaths" ascii fullword
$a3 = "ChromeGetLocalName" ascii fullword
$a4 = "GetBrowsers" ascii fullword
$a5 = "Software\\Valve\\SteamLogin Data" wide fullword
$a6 = "%appdata%\\" wide fullword
$a7 = "ScanPasswords" ascii fullword
condition:
all of them
}
rule Windows_Trojan_RedLineStealer_63e7e006 {
meta:
author = "Elastic Security"
id = "63e7e006-6c0c-47d8-8090-a6b36f01f3a3"
fingerprint = "47c7b9a39a5e0a41f26fdf328231eb173a51adfc00948c68332ce72bc442e19e"
creation_date = "2023-05-01"
last_modified = "2023-06-13"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "e062c99dc9f3fa780ea9c6249fa4ef96bbe17fd1df38dbe11c664a10a92deece"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 30 68 44 27 25 5B 3D 79 21 54 3A }
$a2 = { 40 5E 30 33 5D 44 34 4A 5D 48 33 }
$a3 = { 4B EF 4D FF 44 DD 41 70 44 DC 41 00 44 DC 41 03 43 D9 3E 00 44 }
condition:
all of them
}
rule Windows_Trojan_RedLineStealer_f07b3cb4 {
meta:
author = "Elastic Security"
id = "f07b3cb4-a1c5-42c3-a992-d6d9a48bc7a0"
fingerprint = "8687fa6f540ccebab6000c0c93be4931d874cd04b0692c6934148938bac0026e"
creation_date = "2023-05-03"
last_modified = "2023-06-13"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "5e491625475fc25c465fc7f6db98def189c15a133af7d0ac1ecbc8d887c4feb6"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 3C 65 6E 63 72 79 70 74 65 64 5F 6B 65 79 3E 6B 5F 5F 42 61 63 6B 69 6E 67 46 69 65 6C 64 }
$a2 = { 45 42 37 45 46 31 39 37 33 43 44 43 32 39 35 42 37 42 30 38 46 45 36 44 38 32 42 39 45 43 44 41 44 31 31 30 36 41 46 32 }
condition:
all of them
}
rule Windows_Trojan_RedLineStealer_4df4bcb6 {
meta:
author = "Elastic Security"
id = "4df4bcb6-a492-4407-8d8f-bbb835322c98"
fingerprint = "a9e08bf28e8915615f9b39ab814a46c092b5714ef9133f740a1f1f876bfda2d9"
creation_date = "2023-05-04"
last_modified = "2023-06-13"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "9389475bd26c1d3fd04a083557f2797d0ee89dfdd1f7de67775fcd19e61dfbb3"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 34 42 30 35 43 45 42 44 37 44 37 30 46 31 36 30 37 44 34 37 34 43 41 45 31 37 36 46 45 41 45 42 37 34 33 39 37 39 35 46 }
condition:
all of them
}
rule Windows_Trojan_RedLineStealer_15ee6903 {
meta:
author = "Elastic Security"
id = "15ee6903-757f-462b-8e1c-1ed8ca667910"
fingerprint = "d3a380f68477b98b3f5adc11cc597042aa95636cfec0b0a5f2e51c201aa61227"
creation_date = "2023-05-04"
last_modified = "2023-06-13"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "46b506cafb2460ca2969f69bcb0ee0af63b6d65e6b2a6249ef7faa21bde1a6bd"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 53 65 65 6E 42 65 66 6F 72 65 33 }
$a2 = { 73 65 74 5F 53 63 61 6E 47 65 63 6B 6F 42 72 6F 77 73 65 72 73 50 61 74 68 73 }
condition:
all of them
}
rule Windows_Trojan_RedLineStealer_6dfafd7b {
meta:
author = "Elastic Security"
id = "6dfafd7b-5188-4ec7-9ba4-58b8f05458e5"
fingerprint = "b7770492fc26ada1e5cb5581221f59b1426332e57eb5e04922f65c25b92ad860"
creation_date = "2024-01-05"
last_modified = "2024-01-12"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "809e303ba26b894f006b8f2d3983ff697aef13b67c36957d98c56aae9afd8852"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a = { 33 38 46 34 33 31 41 35 34 39 34 31 31 41 45 42 33 32 38 31 30 30 36 38 41 34 43 38 33 32 35 30 42 32 44 33 31 45 31 35 }
condition:
all of them
}
rule Windows_Trojan_RedLineStealer_983cd7a7 {
meta:
author = "Elastic Security"
id = "983cd7a7-4e7b-413f-b859-b5cbfbf14ae6"
fingerprint = "6dd74c3b67501506ee43340c07b53ddb94e919d27ad96f55eb4eff3de1470699"
creation_date = "2024-03-27"
last_modified = "2024-05-08"
threat_name = "Windows.Trojan.RedLineStealer"
reference_sample = "7aa20c57b8815dd63c8ae951e1819c75b5d2deec5aae0597feec878272772f35"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$decrypt_config_bytes = { 72 ?? ?? ?? 70 80 ?? ?? ?? 04 72 ?? ?? ?? 70 80 ?? ?? ?? 04 72 ?? ?? ?? 70 80 ?? ?? ?? 04 72 ?? ?? ?? 70 80 ?? ?? ?? 04 [0-6] 2A }
$str1 = "net.tcp://" wide
$str2 = "\\Discord\\Local Storage\\leveldb" wide
condition:
all of them
}